摘要:
A portable electronic device receives wireless signals from an external signal-generating source. The wireless signals include offering identifiers that are associated with an offering at a location of the external signal-generating source. The portable electronic device may determine the offering identifier from the wireless signal, and match the offering identifier with one or more offerings of interest that are selected by the user. The portable electronic device may determine the direction from which the wireless signal is received based on the strength of the wireless signal received by the antenna, and presenting an indicator to the user that indicates the direction to the location of the external signal-generating source if the offering identifier matches one or more of the offerings of interest as selected by the user.
摘要:
A method, programmed medium and system are provided for implementing a prebuilt and encrypted personal identification information (PII) profile which resides only on a user's computer and is prevented from being permanently stored in a server's database. In an exemplary embodiment, when a user visits a web site and creates a new account, the site submits a request to query the user's profile using an extension to the HTTP protocol. The user is prompted by the user's browser to grant the site permission to do so and the site automatically uploads a non-personal identifying number (ID) to the user's system to create an account. All personal information remains on the user's computer within the user's encrypted PII profile and is not allowed to be stored in the server's storage. Therefore, each time the user purchases something, the site must again request to query the user's profile for the user's name, credit card information and/or billing address or other information, rather than keeping that information in the web site's datastore.
摘要:
A network service allocation device including a probe, a module, and an engine. The device collects performance data relating to the physical characteristics of a distributed data processing system. The module utilizes the performance data to identify two or more node clusters on the distributed data processing system. The engine correlates the node clusters and one or more performance rules as related to the network service to provide a map of node cluster(s) for supporting the network service, or a list of one or more servers within a node cluster for supporting the network service.
摘要:
A method, system, and computer program product for implementing messaging services is provided. The method includes receiving a request to delete a message that includes an attachment from a computer system. In response to the request, a user of the computer system is provided with options to save the attachment and to delete the attachment along with the message. If the user selects the delete option, the message is sent to a messaging system trash folder and the attachment is sent to an operating system trash folder. If the user selects the option to save the attachment, the message is separated from the attachment and the user is prompted to select an operating system storage location for saving the attachment. In response to receiving the selected operating system storage location, a copy of the attachment is stored in the selected location and the message is sent to the messaging system trash folder.
摘要:
Sending E-Mail including the conventional implementation enabling the sender of an electronic mail document to specify users to receive the document; but, in addition, the process invites the sender creating the E-Mail to prompt the sender with more potential recipients as the sender, proceeds with the creation of the E-Mail message. An address book is maintained including the E-Mail addresses of a set of names of selected recipients who regularly receive E-Mail from the sender. Then, there is monitoring the text being entered for words with initial capital letters combined with an implementation responsive to the monitoring for determining if a located word with an initial capital corresponds to a name in said address book. The corresponding name to the designated recipients of the E-Mail message provided the sender interactively agrees to do so. Optionally, the system may be set up so the monitoring is for two consecutive words with initial capitals corresponding to the first and last name of a recipient in said address book.
摘要:
A method, system, and computer program product for providing a user with intelligent access to a skilled consultant. In response to receiving a user input describing an issue about which consultation is desired, the method includes mapping the user input to one or more selected problem domains. Based on a list of skill(s) for consulting in the selected problem domain, the selected problem domain is mapped to a consultant set of one or more consultants associated with the skill(s). The consultant set is filtered to determine whether consultant(s) in the consultant set are available to consult utilizing communication via a data processing system (DPS). A consultation request is sent to available consultant(s) in the consultant set. In response to receiving, from an available consultant, an acceptance of the consultation request, the consulting information is communicated between the available consultant and the user in substantially real time via the DPS.
摘要:
A method, medium and implementing processing system are provided in which the presence of workers in a long highway construction zone is monitored and the electronically-controlled posted speed limit is adjusted in accordance with the detected presence of workers in the immediate area. In an example, Radio Frequency Identification (RFID) scanners or readers are strategically placed in a construction or working area. Such RFID reading devices may be embedded, for example, in construction speed limit signs. The displayed speed limit is controlled by the detected proximity of construction workers wearing RFID-embedded clothing, for example, such as safety vests or helmets. The speed limit sign includes logic to display one of many possible speed limit displays based on the nearest, and/or the number of RFID signals detected in a given area. Vehicular traffic is thereby enabled to travel faster through construction zones where no workers are present and, when appropriate, traffic is slowed when workers are present within a given proximity of the RFID reading devices.
摘要:
A computer implemented method and computer program product for managing audio information. The process retrieves an audio stream comprising audio information. The process generates a pair of audio tags in an audio tag frequency band. The audio tag frequency band is a frequency band different than the frequency band of the audio information. The audio tags correspond to a given function. The process superimposes the audio tags on the audio information to form a tagged audio information segment. The process retrieves the tagged audio information segment from the audio stream corresponding to the given function in response to receiving a selection of the given function. The tagged audio information segment can be managed according to the function to which the audio tags have been associated.
摘要:
A system and method for using strip information elements to provide secure data exchange and efficient bandwidth utilization is presented. When a person attends an event, an agent is downloaded into the persons' handheld device. The agent receives and manages strip information elements. The strip information elements do not carry the complete information, but carry the elements necessary to retrieve, format, and display the information. The agent authenticates the strip information elements, and scans the different fields in the strip information elements to make decisions according to the content of the field. Strip information elements include identifiers to distinguish between multiple events and also to determine whether a previously transmitted strip information element should be replaced with a newly received strip information element.
摘要:
Bottleneck link speed, or the transmission speed of the slowest link within a path between two nodes, is determining by transmitting a sequence of ICMP ECHO data packets from the source node to the target node at a selected interval and measuring the return data packet intervals. Rather than using statistical analysis methods, the return data packet interval measurements are input into an adaptive resonance theory neural network trained with the expected interval for every known, existing network transmission speed. The neural network will then classify the return data packet interval measurements, indicating the bottleneck link speed. Since most of the computation—that required to train the neural network—may be performed before the data packet interval measurements are made rather than after, the bottleneck link speed may be determined from the return data packet interval measurements significantly faster and using less computational resources than with statistical analysis techniques. Moreover, fewer measurements are required to determine bottleneck link speed to the same degree of accuracy.